Susilo, Willy (ed.); Yang, Guomin (ed.) Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. (English) Zbl 1392.94009 Lecture Notes in Computer Science 10946. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). xv, 833 p. (2018). Show indexed articles as search result. The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1365.94006; Zbl 1365.94005].Indexed articles:Peng, Liqiang; Lu, Yao; Kunihiro, Noboru; Zhang, Rui; Hu, Lei, A deterministic algorithm for computing divisors in an interval, 3-12 [Zbl 1421.11105]Wen, Yunhua; Liu, Shengli, Reusable fuzzy extractor from LWE, 13-27 [Zbl 1444.94107]Cheon, Jung Hee; Jeong, Jinhyuck; Kim, Dongwoo; Lee, Jongchan, A reusable fuzzy extractor with practical storage size: modifying Canetti et al.’s construction, 28-44 [Zbl 1444.94053]David, Bernardo; Dowsley, Rafael; Larangeira, Mario, 21 – bringing down the complexity: fast composable protocols for card games without secret state, 45-63 [Zbl 1444.94060]Kikuchi, Ryo; Ikarashi, Dai; Matsuda, Takahiro; Hamada, Koki; Chida, Koji, Efficient bit-decomposition and modulus-conversion protocols with an honest majority, 64-82 [Zbl 1444.94076]Xia, Zhe; Sun, Liuying; Yang, Bo; Zhou, Yanwei; Zhang, Mingwu, Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems, 83-100 [Zbl 1444.94122]Kim, Eunkyung; Lee, Hyang-Sook; Park, Jeongeun, Towards round-optimal secure multiparty computations: multikey FHE without a CRS, 101-113 [Zbl 1444.94078]Paul, Souradyuti; Shrivastava, Ananya, Robust multiparty computation with faster verification time, 114-131 [Zbl 1444.94095]Heys, Howard M., Distributed time-memory tradeoff attacks on ciphers (with application to stream ciphers and counter mode), 135-153 [Zbl 1444.94070]Ito, Ryoma; Miyaji, Atsuko, New iterated RC4 key correlations, 154-171 [Zbl 1444.94072]Ye, Chendong; Tian, Tian, A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers, 172-187 [Zbl 1444.94110]Marrière, Nicolas; Nachef, Valérie; Volte, Emmanuel, Differential attacks on reduced round LILLIPUT, 188-206 [Zbl 1444.94089]Sarkar, Sumanta; Syed, Habeeb, Bounds on differential and linear branch number of permutations, 207-224 [Zbl 1444.94098]Naito, Yusuke, Keyed sponge with prefix-free padding: independence between capacity and online queries without the suffix key, 225-242 [Zbl 1444.94093]Boyen, Xavier; Haines, Thomas, Forward-secure linkable ring signatures, 245-264 [Zbl 1444.94048]Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K., Revocable identity-based encryption from the computational Diffie-Hellman problem, 265-283 [Zbl 1444.94071]Li, Shimin; Liang, Bei; Xue, Rui, Private functional signatures: definition and construction, 284-303 [Zbl 1444.94086]Zheng, Haibin; Wu, Qianhong; Qin, Bo; Zhong, Lin; He, Shuangyu; Liu, Jianwei, Linkable group signature for auditing anonymous communication, 304-321 [Zbl 1444.94116]Zhong, Lin; Wu, Qianhong; Qin, Bo; Zheng, Haibin; Liu, Jianwei, Auditable hierarchy-private public-key encryption, 322-340 [Zbl 1444.94117]Anada, Hiroaki; Kanaoka, Akira; Matsuzaki, Natsume; Watanabe, Yohei, Key-updatable public-key encryption with keyword search: models and generic constructions, 341-359 [Zbl 1444.94040]Ma, Xuecheng; Wang, Xin; Lin, Dongdai, Anonymous identity-based encryption with identity recovery, 360-375 [Zbl 1444.94090]Liu, Chi; Chen, Rongmao; Wang, Yi; Wang, Yongjun, Asymmetric subversion attacks on signature schemes, 376-395 [Zbl 1444.94087]Xu, Yan; Ding, Ran; Cui, Jie; Zhong, Hong, Intrusion-resilient public auditing protocol for data storage in cloud computing, 399-416 [Zbl 06944256]Shen, Jian; Liu, Dengzhi; Chen, Xiaofeng; Huang, Xinyi; Chen, Jiageng; Zhang, Mingwu, Secure publicly verifiable computation with polynomial commitment in cloud computing, 417-430 [Zbl 06944257]Liu, Lin; Su, Jinshu; Chen, Rongmao; Liu, Ximeng; Wang, Xiaofeng; Chen, Shuhui; Leung, Hofung, Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, 431-451 [Zbl 06944258]Li, Haoyu; Liu, Renzhang; Nitaj, Abderrahmane; Pan, Yanbin, Cryptanalysis of the randomized version of a lattice-based signature scheme from PKC’08, 455-466 [Zbl 1444.94085]Ding, Jintai; Fluhrer, Scott; Rv, Saraswathy, Complete attack on RLWE key exchange with reused keys, without signal leakage, 467-486 [Zbl 1444.94063]Wang, Yacheng; Ikematsu, Yasuhiko; Duong, Dung Hoang; Takagi, Tsuyoshi, Efficient decryption algorithms for extension field cancellation type encryption schemes, 487-501 [Zbl 1444.94105]Yu, Zuoxia; Au, Man Ho; Yang, Rupeng; Lai, Junzuo; Xu, Qiuliang, Lattice-based universal accumulator with nonmembership arguments, 502-519 [Zbl 1444.94111]Zhang, Daode; Zhang, Kai; Li, Bao; Lu, Xianhui; Xue, Haiyang; Li, Jie, Lattice-based dual receiver encryption and more, 520-538 [Zbl 1444.94114]Lai, Qiqi; Yang, Bo; Yu, Yong; Chen, Yuan; Dong, Liju, Anonymous identity-based hash proof system from lattices in the standard model, 539-557 [Zbl 1444.94081]Alberto Torres, Wilson Abel; Steinfeld, Ron; Sakzad, Amin; Liu, Joseph K.; Kuchta, Veronika; Bhattacharjee, Nandita; Au, Man Ho; Cheng, Jacob, Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0), 558-576 [Zbl 1444.94038]Kılınç, Handan; Vaudenay, Serge, Secure contactless payment, 579-597 [Zbl 1444.94077]Ahmadi, Ahmad; Safavi-Naini, Reihaneh; Akand, Mamunur, New attacks and secure design for anonymous distance-bounding, 598-616 [Zbl 1444.94037]Zou, Deqing; Deng, Zhijun; Li, Zhen; Jin, Hai, Automatically identifying security bug reports via multitype features analysis, 619-633 [Zbl 06944268]Zeng, Yali; Li, Xu; Yang, Xu; Xu, Qikui; Wang, Dongcheng, A practical privacy preserving protocol in database-driven cognitive radio networks, 634-648 [Zbl 1444.94112]Cui, Jie; He, Jiantao; Xu, Yan; Zhong, Hong, TDDAD: time-based detection and defense scheme against ddos attack on SDN controller, 649-665 [Zbl 06944270]Hu, Kexin; Zhang, Zhenfeng, Fast lottery-based micropayments for decentralized currencies, 669-686 [Zbl 06944271]Yin, Jiayuan; Wang, Changren; Zhang, Zongyang; Liu, Jianwei, Revisiting the incentive mechanism of bitcoin-NG, 706-719 [Zbl 06944273]Yang, Rupeng; Au, Man Ho; Xu, Qiuliang; Yu, Zuoxia, Decentralized blacklistable anonymous credentials with reputation, 720-738 [Zbl 06944274]Sun, Yinxia; Zhang, Futai; Fu, Anmin, Revocable certificateless encryption with ciphertext evolution, 741-749 [Zbl 1444.94101]Lau, Terry Shue Chien; Tan, Chik How, A new encryption scheme based on rank metric codes, 750-758 [Zbl 1444.94082]Meng, Weizhi; Wang, Yu; Li, Wenjuan; Liu, Zhe; Li, Jin; Probst, Christian W., Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing, 759-767 [Zbl 06944277]Barbar, Mohamad; Sui, Yulei; Zhang, Hongyu; Chen, Shiping; Xue, Jingling, Live path CFI against control flow hijacking attacks, 768-779 [Zbl 06944278]Lee, Hyung Tae; Wang, Huaxiong; Zhang, Kai, Security analysis and modification of ID-based encryption with equality test from ACISP 2017, 780-786 [Zbl 1444.94083]Wang, Yuntao; Takagi, Tsuyoshi, Improving the BKZ reduction algorithm by quick reordering technique, 787-795 [Zbl 1444.94106]Sun, Yeali S.; Chen, Chien-Chun; Hsiao, Shun-Wen; Chen, Meng Chang, Antsdroid: automatic malware family behaviour generation and analysis for Android apps, 796-804 [Zbl 06944281]Lai, Junzuo; Huang, Zhengan; Au, Man Ho; Mao, Xianping, Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation, 805-812 [Zbl 1444.94080]Lu, Xingye; Zhang, Zhenfei; Au, Man Ho, Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction, 813-820 [Zbl 1444.94088]Sarkar, Pinaki; Baranwal, Mayank; Nandi, Sukumar, CRT-KPS: Ukey predistribution schemes using CRT, 821-830 [Zbl 1444.94097] Cited in 1 Review MSC: 94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory 94A60 Cryptography 94A62 Authentication, digital signatures and secret sharing 00B25 Proceedings of conferences of miscellaneous specific interest PDF BibTeX XML Cite \textit{W. Susilo} (ed.) and \textit{G. Yang} (ed.), Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11--13, 2018. Proceedings. Cham: Springer (2018; Zbl 1392.94009) Full Text: DOI